On Access Control in Cabin-Based Transport Systems

被引:5
|
作者
Grippa, Pasquale [1 ]
Schilcher, Udo [2 ]
Bettstetter, Christian [1 ]
机构
[1] Alpen Adria Univ Klagenfurt, Inst Networked & Embedded Syst, A-9020 Klagenfurt, Austria
[2] Lakeside Labs GmbH, A-9020 Klagenfurt, Austria
关键词
Queuing theory; waiting time; stability; fairness; capacity sharing; access control policies; ski lift; boarding; BULK-SERVICE QUEUE; DISCRETE-TIME;
D O I
10.1109/TITS.2018.2864551
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
We analyze a boarding solution for a transport system in which the number of passengers allowed to enter a transport cabin is automatically controlled. Expressions characterizing the stochastic properties of the passenger queue length, waiting time, and cabin capacity are derived using queuing theory for a transport line with deterministic arrivals of cabins and Poisson arrivals of passengers. The expected cabin capacity and stability threshold for each station are derived for a general passenger arrival distribution. The results show that a significant reduction of the waiting time at a given station is only possible at the cost of making the stability of one of the preceding stations worse than that of the given station. Studies with real passenger arrivals are necessary to draw firm conclusions.
引用
收藏
页码:2149 / 2156
页数:8
相关论文
共 50 条
  • [31] Annotation-based Access Control Approach for Ubiquitous Systems
    Benigno, Rhoney
    Pedrosa, Natan
    Tome, Pedro
    Araujo, Wesley
    Torres Neto, Jose R.
    Junior, Eucassio
    Mota, Savio
    Filho, Jose B.
    Martin, Herve
    2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, : 218 - 225
  • [32] A Trust and Context Based Access Control Model for Distributed Systems
    Feng, Fujun
    Lin, Chuang
    Peng, Dongsheng
    Li, Junshan
    HPCC 2008: 10TH IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2008, : 629 - +
  • [33] Behavior-based access control for distributed healthcare systems
    Yarmand, Mohammad
    Sartipi, Kamran
    Down, Douglas
    JOURNAL OF COMPUTER SECURITY, 2013, 21 (01) : 1 - 39
  • [34] Policy storage for role-based access control systems
    Belokosztolszki, A
    Eyers, DM
    Wang, W
    Moody, K
    TWELFTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2003, : 196 - 201
  • [35] Access control based on code identity for open distributed systems
    Cirillo, Andrew
    Riely, James
    TRUSTWORTHY GLOBAL COMPUTING, 2008, 4912 : 169 - +
  • [36] Resource and Role Hierarchy Based Access Control for Resourceful Systems
    Solanki, Nidhiben
    Huang, Yongtao
    Yen, I-Ling
    Bastani, Farokh
    Zhang, Yuqun
    2018 IEEE 42ND ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC 2018), VOL 2, 2018, : 480 - 486
  • [37] Role-based access control model for CSCW systems
    Li, Chengkai
    Zhan, Yongzhao
    Mao, Bing
    Xie, Li
    Ruan Jian Xue Bao/Journal of Software, 2000, 11 (07): : 931 - 937
  • [38] Types for task-based access control in workflow systems
    Lu, Y.
    Zhang, L.
    Sun, J.
    IET SOFTWARE, 2008, 2 (05) : 461 - 473
  • [39] Access control coherence of information systems based on security constraints
    Poniszewska-Maranda, Aneta
    COMPUTER SAFETY, RELIABILTIY, AND SECURITY, PROCEEDINGS, 2006, 4166 : 412 - 425
  • [40] Deconflicting policies in attribute-based access control systems
    Yahiaoui, Mohamed
    Zinedine, Ahmed
    Harti, Mostafa
    2018 IEEE 5TH INTERNATIONAL CONGRESS ON INFORMATION SCIENCE AND TECHNOLOGY (IEEE CIST'18), 2018, : 130 - 136